This class will involve a war drive around Kuala Lumpur on the first day and as such is limited to 20 participants only. This two day hands-on workshop will cover wireless/mobile environments intrusion detection, secure wireless protocols, denial of service, privacy and anonymity, prevention of traffic analysis, wireless networking, monitoring and surveillanceï¿½

Wireless Technology is ubiquitous: hand phones, cordless phones, Wi-Fi LANs Bluetooth are everywhere. While wireless technology may be desirable to corporations because of the mobility and cost-saving it offers, wireless security has been elusive.

By default, most wireless networks are insecure and present a number of threats:

# Loss of Confidentiality (atm transactions, emails, confidential documents, etc.)
# Denial of Service, business interruption
# Theft of Service
# Internal networks may be exposed to outsiders and hackers may propagate via wireless to your network, partners and clients
# Corporate network could be used to launch stealth attacks against other targets or to transit spam

Anthony is the founder and CTO of Bellua Asia Pacific and the co-founder of the Hacker Emergency Response Team (HERT). He has more than ten years of progressive information security experience that include performing penetration testing, assessments, audit, computer forensics and other related services for some of the largest Asian banks and a dozen European-based Fortune 500 companies. Anthony was an invited speaker at HITB 2005, Cisco Security Summit 2005/2003, Apconex 2005, Syscan 05/04, Pakcon 2004, Info War Con Bruxelles 1996, Sicoval 1997, Infonord 1998. Heï¿½s a certified ISO27001/BS7799 ISMS Auditor.

About Jim

Jim is an information security consultant at Bellua Asia Pacific where his work in penetration testing allows him to focus on attack as well as defense. He has performed extensive research on network and host mapping, intrusion detection and prevention system, wireless hotspot security and operating system hardening. Jim was an active contributor in the development of FreeBSD and OpenBSD operating systems. He loves exploring computer system in unusual ways.

Jim has been an invited speaker on several conferences worldwide such as Bellua Cyber Security Asia, Hack In The Box, Cisco Security Summit and IT Underground as well as university and government symposiums. He has been quoted in numerous national publications including Jakarta Post, Kompas, and Detik-I-Net.